Remote Control System The Hacking Suite for Governmental
- Slides: 44
Remote Control System The Hacking Suite for Governmental Interception Milan - 23/08/2013
The Building Blocks
Remote Agent Secure Frontend Scalable Backend Infection Vectors
Complete solution, not a toolkit Totally developed by us
Remote agent Your personal 007
What can we collect?
Camera Calls Messages Location Chat Keystrokes Microphone Documents Contacts Passwords Calendars Visited websites And much more…
Runs on an event-driven logic Autonomous
Events When crossing the border Every day at midnight On hidden SMS On voice call Actions Start microphone recording Destroy the device Send collected data Take a camera snapshot
Many different events and actions Combine them to suit your needs
What if my target is security aware?
Invisible to target user Invisible to antivirus and anti-rootkits Anti-forensic measures Resistant to format and restoration
Evidence on remote device How can we collect it?
Internet connection Firewalls and proxies are passed through
Wi. Fi Open and saved networks
GPRS / UMTS / 3 G+ Avoid billing the target with custom APN
Where can I install the Agent?
Secure Frontend An invisible barrier
Agent is connecting to your servers Your identity must be kept secret
Configurable on-the-fly Evidence stays encrypted
Scalable Backend Your data vault
Scalable by design
Agents Collector Database x 300
Agents Collector 1 Collector 2 x 10000 … Collector N Database Shard 1 Shard 2 … Shard N
Scale when you need Adding servers is transparent Load balancing is automatic
No database administration required Set & Forget backups Fast restore in 5 minutes
Real-time alerting Be informed on interesting events
Polished graphical console The whole system from a single point
Infection Vectors Deploy your forces
How can I deploy my agent?
When the target opens a document
0 -day exploits pack Always up to date
While the target browses the web
Inject into downloaded applications Inject into web pages
Bob’s laptop Internet Network Injector Web site
Send your target an SMS
And many more…
Third-party Integration Combine your weapons
Easily integrate with your monitoring center
Demo time!
- Ethical hacking: hacking web servers and web applications
- Remote control system da vinci
- Vision of ngo
- Government accounting basics
- Governmental systems
- Louisiana code of governmental ethics
- Louisiana code of ethics
- Role of ngo in development communication
- Nongovernmental health agencies are funded primarily by:
- Rcs remote control systems
- Ham radio remote operation
- Lego remote control car
- Hhc remote control ch11
- Fujitsu - remote control - for esprimo q1500, q1510
- Ham remote control
- Anatomi hacking
- Ethical hacking disclaimer
- Hands-on ethical hacking and network defense
- Ethical hacking definition
- "web file browser" "use regular expression"
- Usb hacking tools
- Hacking disclaimer
- Linux kernel programming part 2
- Ethical hacking terminologies
- Ethicsl hacking
- Ethical hacking disclaimer
- Linux kernel hacking
- Hacking site drive.google.com
- Hacking your head
- Ethical hacking seminar
- Speech on ethical hacking
- Hacking exposed 9
- Xss advanced
- Tamagotchi the movie
- Google hacking index of
- Growth hacking case studies
- Hacking exposed 9
- Advanced website hacking
- Ideal remote sensing system
- Idealized remote sensing system
- Distributed file system definition
- Create a java rmi calculator application.
- Latchmatic remote locking system
- Fspos
- Typiska novell drag